Using wifite and reaver together gives us the possibility of obtaining WPA and WPA2passwords without using dictionaries.

In this post we will see how to install both tools on a Ubuntu machine and a small demonstration of use. Wifite documentation recommends installing other tools such aspyryt, cowpatty and tshark in order to verify WPAhandshakes, but in this case we’ll install only reaver, since it’s all we need to attack networks with WPS encryption.

Usually wifite is used with any of the available options. In this example we are interested in finding WPS enabled networks and, therefore, we run the program with the option:

# python wifite.py -wps

Automatically, wifite enables monitor mode on the network interface -obviously the device must have that capability- and scans looking for networks with WPS enabled. This process ends when they the user types Ctrl + C.

Then we’ll be asked about our targets. The procedure can be seen perfectly in the figure below. When targets are selected, wifite will use reaver to run a brute force attack on them. Now all you need is patience.

When the attack ends, wifite disables automatically monitor mode on the network interface and exits.

Other examples of usage can be found on the official website of wifite. Here are some examples: